3.9 C
London
Monday, December 5, 2022

What you need to know about confidential computer use

Must read

Woman claiming to be a relative of Chris Christie injures 6 deputies after being kicked off plane, sheriff’s office says

A woman claiming to be related to former New Jersey governor Chris Christie injured six deputies after she was kicked off a Spirit Airlines...

Sam Bankman-Fried says unlikely to testify at House Committee hearing on Dec. 13 londonbusinessblog.com

Sam Bankman-Fried, the former CEO of FTX, indicated on Sunday that he is unlikely to testify in the upcoming US House committee hearing into...

Mozilla acquires Active Replica to build on its inverted vision • londonbusinessblog.com

An automated status updater for Slack isn't the only thing Mozilla has acquired this week. On Wednesday, the company announced that it has...

DJI’s cheaper Mini 3 drone could be launched very soon

It looks like DJI is gearing up to launch the rumored non-Pro version of its Mini 3 drone. While a series of images...
Shreya Christinahttps://londonbusinessblog.com
Shreya has been with londonbusinessblog.com for 3 years, writing copy for client websites, blog posts, EDMs and other mediums to engage readers and encourage action. By collaborating with clients, our SEO manager and the wider londonbusinessblog.com team, Shreya seeks to understand an audience before creating memorable, persuasive copy.

Opinions expressed by londonbusinessblog.com contributors are their own.

With a projected compound annual growth rate of up to 95.6% Between 2021 and 2026, confidential computing is poised to become one of the hottest cybersecurity trends in the coming years, especially in high-risk sectors (and some of our most important ones), such as finance and healthcare.

Let’s see how it changes the game with regard to storing confidential data and which companies are taking this innovative approach.

Related: Cybersecurity is no longer an option. Your money is in immediate danger.

What is Confidential Computing?

Digitization has always been accompanied by a dilemma about what happens to personal information. Events such as the Cambridge Analytica scandal and countless accounts of major organizations that have had their systems hacked show how much risk there is when we use computers and technology.

On an individual level, it’s bad enough: no one wants their bank details or intimate photos stolen. But for businesses and governments, the consequences of reaching sensitive information are even more worrisome. And there is cause for concern: One report found that the number of data breaches in 2021 grew by 17% compared to 2020. So the problem seems to persist.

Confidential computing provides a solution by protecting data while it is still in use. Unlike most encryption methods, it focuses on data that is still being processed (when it remains unencrypted in memory) rather than after. More specifically, it isolates sensitive information and places it in a separate, protected enclave, usually using cloud technology. Then no one can access the data without an authorized application code – and if an unauthorized code (such as malware) tries to get in, access is denied.

Related: A Beginner’s Guide to Cybersecurity for Business Leaders

How confidential computing can change the world

Understanding the theory of confidential computing is a good start, but to properly understand its potential, you need to look at usage scenarios. Since the term itself has “confidential” in its name, the method is an extension of cybersecurity. Since almost every business today relies on cybersecurity to take care of its data at some level, its applications can reach just about any industry or industry; however, it is most beneficial to the companies most at risk in processing data, such as financial and health companies.

Finance

Financial services such as banks have always been the target of hacking attacks, potentially resulting in losses of hundreds of millions of dollars. It is therefore a natural place to take serious cybersecurity measures.

Confidential computing would allow different financial institutions to exchange data without making it vulnerable. For example, banks could share data and perform analytics, identifying potentially suspicious patterns, making it easier to detect fraud cases earlier.

healthcare

Our health is critical to virtually everything we do in life, and sharing data with healthcare providers is inevitable. But sharing it with the wrong hands, such as information about our DNA or diseases, can cause serious problems. Cybersecurity is vital in this regard, and confidential computing could provide a solution by protecting data, even as healthcare professionals use it.

Confidential computing could pave the way for using the data previously considered too risky. For example, collecting data on critically ill patients and using AI to find and understand patterns that may be affecting them. Meanwhile, healthcare organizations are notoriously slow to adapt to these new technologies, in part because of the complications of securing the data.

Related: Cybersecurity Practices That Protect Your Small Business

Companies lead the way

Unsurprisingly, some of the biggest names in technology and computer science are leading the way in confidential computing.

Google Cloud is Google’s confidential computer offering and allows customers to encrypt their data as they use it via advanced CPUs. Plus, people can collaborate without compromising security, which is critical for businesses running dynamic processes.

Then there’s IBM, which has a range of confidential computing services, including IBM Cloud Hyper Protect Cloud Services (which provides end-to-end protection), IBM Cloud Data Shield (for containerized applications), and Secure Execution for Linux (for hybrid cloud environments).

Another name to look at is Microsoft Azure, Microfot’s cloud computing service to protect corporate and consumer data as they use it. Microsoft stores data in hardware and processes it after verifying the cloud environment to ensure security.

But there are also some lesser-known companies with some promising innovations. One of them is the leading Israeli cyber company Hub Security, which uses a variety of hardware and software solutions to store data, in addition to AI tools to monitor data and continuously model potential threats. This could help solve some of the health care and finance problems outlined earlier.

Hub has already approved a merger with a special acquisition company worth $1.28 billion. The deal gives Hub $172 million to fund its business and potentially money from institutional investors in Israel and the US. The deal shows investors recognizing its potential — as far as picking early winners in confidential computing, it seems like one to watch.

Related: How cybersecurity firms can appeal to a digitally tired world

A more confidential future?

As confidential computing reinvents how business and security is conducted across industries, the companies at the heart of the industry, providing the technology and tools needed for confidential computing, will grow and thrive rapidly.

More articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest article

Woman claiming to be a relative of Chris Christie injures 6 deputies after being kicked off plane, sheriff’s office says

A woman claiming to be related to former New Jersey governor Chris Christie injured six deputies after she was kicked off a Spirit Airlines...

Sam Bankman-Fried says unlikely to testify at House Committee hearing on Dec. 13 londonbusinessblog.com

Sam Bankman-Fried, the former CEO of FTX, indicated on Sunday that he is unlikely to testify in the upcoming US House committee hearing into...

Mozilla acquires Active Replica to build on its inverted vision • londonbusinessblog.com

An automated status updater for Slack isn't the only thing Mozilla has acquired this week. On Wednesday, the company announced that it has...

DJI’s cheaper Mini 3 drone could be launched very soon

It looks like DJI is gearing up to launch the rumored non-Pro version of its Mini 3 drone. While a series of images...

This wireless charger can help clear up your desk

Opinions expressed by londonbusinessblog.com contributors are their own. Just because Black Friday and Cyber ​​Monday are behind us doesn't mean you can't still take advantage...